Vulnerability Name:

CVE-2001-0825 (CCN-6804)

Assigned:2001-06-29
Published:2001-06-29
Updated:2018-05-03
Summary:Buffer overflow in internal string handling routines of xinetd before 2.1.8.8 allows remote attackers to execute arbitrary commands via a length argument of zero or less, which disables the length check.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Privileges
References:Source: CCN
Type: FreeBSD Security Advisory FreeBSD-SA-01:47
xinetd contains multiple vulnerabilities

Source: CCN
Type: BugTraq Mailing List, Fri Jun 08 2001 - 09:10:41 CDT
potential buffer overflow in xinetd-2.1.8.9pre11-1

Source: MITRE
Type: CNA
CVE-2001-0825

Source: CONECTIVA
Type: Patch, Vendor Advisory
CLA-2001:406

Source: CCN
Type: Conectiva Linux Announcement CLSA-2001:404
xinetd

Source: CCN
Type: Immunix OS Security Advisory IMNX-2001-70-029-01
xinetd

Source: IMMUNIX
Type: UNKNOWN
IMNX-2001-70-029-01

Source: CCN
Type: RHSA-2001-092
Updated xinetd package available for Red Hat Linux 7 and 7.1

Source: CCN
Type: OSVDB ID: 12124
xinetd Internal String Handling Routine Remote Overflow

Source: REDHAT
Type: Patch, Vendor Advisory
RHSA-2001:092

Source: BID
Type: Patch, Vendor Advisory
2971

Source: CCN
Type: BID-2971
Xinetd Zero String Length Buffer Overflow Vulnerability

Source: CCN
Type: SuSE Security Announcement SuSE-SA:2001:022
xinetd

Source: XF
Type: UNKNOWN
xinetd-zero-length-bo(6804)

Source: XF
Type: UNKNOWN
xinetd-zero-length-bo(6804)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:xinetd:xinetd:2.1.8.8:*:*:*:*:*:*:*
  • OR cpe:/a:xinetd:xinetd:2.1.8.9:*:*:*:*:*:*:*
  • OR cpe:/a:xinetd:xinetd:2.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:xinetd:xinetd:*:*:*:*:*:*:*:* (Version <= 2.3.1)

  • Configuration CCN 1:
  • cpe:/o:freebsd:ports_collection:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    xinetd xinetd 2.1.8.8
    xinetd xinetd 2.1.8.9
    xinetd xinetd 2.3.0
    xinetd xinetd *
    freebsd ports collection *
    redhat linux 7
    conectiva linux 6.0
    redhat linux 7.1
    redhat linux 7.2
    redhat linux 7.3